Power Point by: Marc Prenger. Disclaimer / Intro to Hackers The book Hackers is broken up into four parts. Throughout these parts the “Hacker Ethic” is.

Slides:



Advertisements
Similar presentations
Welcome! Happy New Year!!! This is a time of new beginnings with so many exciting things to do and learn. So Welcome to Economics class! I am looking.
Advertisements

Religious Foundations of Democracy
Cyber Time First Grade.
Chapter 7 Management and Leadership
“The significant problems we face today cannot be solved at the same level of thinking we were at when we created them.” Albert Einstein.
The Origins of PowerPoint Click to Start he T r u e T a l e o f P o w e r P o i n t A n d t h e P o w e r P o i n t M V P s B y A u s t i n M y e r s.
THERE IS A WAY.
Chapter 3 The Parties Begin.
Ground Rules for Meetings
Copyright Crash Course Introduction to Multimedia Fall 2009.
Computer Ethics PHILOSOPHICAL BELIEF SYSTEMS Chapter 1 Computer Ethics PHILOSOPHICAL BELIEF SYSTEMS Chapter 1 Hassan Ismail.
Corners of God's Love The more of God's Love you give away, the bigger it gets CreativeHolidayIdeas.com.
“Someone stole my Property!” Do people have the same rights with virtual property as they do with tangible property?
CS351 © 2003 Ray S. Babcock Software Testing What is it?
Copyright in Cyberspace Copyright Law Larry Lessig David Post Eugene Volokh
Working Agreements Norms/Working Agreements.
See no evil Learning Objectives for today : 1. Understand how Religious education is different. 2. Identify what Religion is. 3. Have an understanding.
Copyright, Designs and Patents Act. Introduction You have spent three months working on your coursework. It is absolutely brilliant,, you just know that.
Copyright Basics. What is Copyright? Copyright allows authors, musicians, artists, etc. to make money off of their labor. Copyright allows authors, musicians,
 Advantages  Easy to learn  Graphical Advantages  Help and Support  Widely used  Software compatibility  Customisable  Customisable Hardware 
Causes of the Civil War. What was the Civil War  War between the Northern U.S. States and the Southern U.S. States  Lasted 4 years:  Brother.
Viruses.
Nine Elements of Digital Citizenship BH. Nine elements is identified to create a digital citizenship. Digital Access: full electronic participation in.
 You will face ethical dilemmas in your career – count on it!  Your decisions will affect: ◦ your professional reputation. ◦ your employability. ◦ the.
Fox and Mule Go To The Library. Fox and Mule went to the library. Only one of them had a good day. Can you tell why only one of them had a good day?
The Stock Market Shares. One day, Jane had a great idea for a whole range of new computer games. She played a lot of computer games and her friends had.
Internet Safety Dangers and Netiquette Trust No One You Don’t Know! A shark is a predator. Predators swim around looking for victims. The ocean is beautiful.
© Copyright © A Quick Guide. What does the law actually say? Introduced to protect people who have created original pieces of work. Books, Music, Films,
MUHAMAD SYAFIQ BIN BORHANUDIN SR2211M1.
Industrial Revolution Philosophers New economic ideas.
Chapter 1: Welcome to Linux An intro to UNIX-related operating systems.
The Computer Basics. A computer is an electronic machine Computers can do anything that someone tells them to do Since computers are so fast at processing.
1 Ethical Issues in Computer Science CSCI 328, Fall 2013 Session 17 Software as Intellectual Property.
Making Decisions uCode: October Review What are the differences between: o BlueJ o Java Computer objects represent some thing or idea in the real.
Elements of a Computer System Understanding Computers.
1 Ethics of Computing MONT 113G, Spring 2012 Session 32 Software as Intellectual Property.
COMPUTERS IN EVOLUTION JACK KIRBY 3554 WILDERN SCHOOL
MODUL 2: KEY POINTS IN DEVELOPING ANDROID APPS Studio Mobile Content Development IMTelkom 2012.
Advantages of Using a Network By Ryan Riddell. Shared Files The same files can be accessed from different computers on the network Files can be traded,
Splash Screen. 1.A 2.B 3.C 4.D Five Minute Check 1 A.309 B.479 C.527 D.637 A survey of high school students said that 63% planned on taking college courses.
After today’s lesson I will be able to: Explain Kant’s theory on moral ethics Explain the term ‘categorical imperative’ Understand the phrase 'Duty and.
Computer control In collaboration with:. What is…
“Hi, I’m Officer Linda!” “Today, Officer George and I are going to be teaching you the rules of staying safe on the Internet!” “The Internet can be a.
Jane Carter Golf Unlimited. What do we know? Supply and demand means: You need to look after the customers you have You need to ask for the business!
Bill gates is a inventor he became the chief of the Microsoft in January, 2000.
Crime, Punishment…and Teens Page 187. Ac-cuse Part of speech: verb (action word) Definition: to accuse someone is to say that he/she has done something.
 Hackers Heroes of the Computer Revolution By Phil Dinovo.
The Basics of Economics. Economic Activity Our economy, much like others around the world operate on a circular flow of economic activity. –Goods and.
 The original hackers who disliked the IBM machines preferring machines like TX-0 and PDP- 1.  Hacked for the fun of hacking  Felt all code was free.
ICT and the Law Mr Conti. Did you see anything wrong with that? Most people wouldn’t want that sort of information posted in a public place. Why? Because.
Reduced Instruction Set Computing Ammi Blankrot April 26, 2011 (RISC)
The problem that needs to be solved is if a computer career is for me.
Teaching slides Chapter 1. Chapter 1: Introduction Introduction Components of a computer Building the software products What is software engineering?
IS THIS BULLYING? Not asking someone to play with you IS THIS BULLYING? No Telling a joke about someone and everyone finding it funny No IS THIS BULLYING?
Copyright, Designs and Patents Act What does it cover? The Copyright, Designs and Patents Act covers work.
Religious Foundations of Democracy A.Judaism B.Christianity C.Islam.
Hackers: Heroes of the Computer Revolution By: Steven Levy.
NEXT Resources Buying and selling Services WORK Mismash Team One Team Two Team Three Team Four Team Five.
Kaplan University LS 512 Unit 7 Town Hall John P. Gray.
Violence In media Simon May. Introduction This is my introduction to my Task 3 and I will be conduction this powerpoint on weather or not media has a.
Project Brief for Action Learning Sets This report says how this work will be done.
JA Our Nation Name Title Company. JA Our Nation Session One Objectives: Free to Choose Your Work or Business Identify the characteristics of a free market.
Elements of a computer system
The hacker approach: the deve-lopment of free licenses
CS Presentation Michael Retrum.
Hello World! CSE442.
Safe Searching The internet is the biggest library in the world you can find almost anything you want to From TV shows to sports results is what can help.
Elements of a Computer System
Computer Science Testing.
How liberals and socialist were alike and different in the 19th century Edward Chris Ricky.
Presentation transcript:

Power Point by: Marc Prenger

Disclaimer / Intro to Hackers The book Hackers is broken up into four parts. Throughout these parts the “Hacker Ethic” is a main theme. In the following five slides I will discuss the hacker ethic and then continue to touch on each of the four parts of the book. Unfortunately, I will not be revealing the entire book to you. If you are interested in the book, I suggest you go to your local library and ask if they have it! -Marc Prenger

The Hacker Ethic  The hacker ethic is not written down. It is not stored in a computer somewhere. It is not a law that is used to establish boundaries for hackers. It is simply something that was commonly and silently agreed on. It is an idea that the standard hacker abides by as a code of conduct. The hacker ethic basically agrees with the following: Access to anything that can reveal something about the world should be total and unlimited. Any information should be free to anyone.

Part One: True Hackers  As hackers first emerged, being based in MIT, they, of course, followed the hacker ethic. Their original attempts started out with making the world know what they were and what they wanted to do. Hackers would attempt to make programs better. They would find an already existing program or machine and make it more efficient or make it run better. In the case of Hubert Dreyfus (an academic), Ricky Greenblatt created a more efficient chess program that beat Dreyfus, who said that no chess program could beat someone over 10-years-old.  In creating more efficient programs and machines, hackers followed hacker ethic saying that anything they do should be done without any profit. What is done should be done so that everyone has free access to it.

Part Two: Hardware Hackers  As the hackers became decentralized (no academic structure supporting any of their activities like the students from MIT) they began to focus less on software and more on the liberation of computers from the massive industry bureaucracies. The Homebrew Computer club was created in order to give hackers a place to meet with each other and trade equipment and software, keeping with the hacker ethic.  Hackers that were considered “Hardware Hackers” had the intent of building computers that used smaller amounts of chips while keeping the same or even better efficiency of the machine. As more and more hackers joined clubs, they began perfecting their hardware systems and would start businesses.

Part Three: Game Hackers  As computers became more and more accessible to people, personal computers were being bought by people who had no intention of programming on them. They wanted to play games. This brought a rise in the amount of hackers who programmed games. Some game hackers, such as Ken and Roberta Williams (founders of Sierra On-Line), ended up making lots of money because of their transition into game programming.

Epilogue: The Last of the True Hackers  Richard Stallman is called, by Levy, the “last of the true hackers.” He is not the last “real” hacker, but rather the last of the original “true hackers” who believed in every type of information being free to everyone. He worked on making programs that were free to everyone, and he believed that the hacker ethic should be followed by everyone. As time passed, more and more people did not agree with the hacker ethic. People did not believe that all information should be accessible to everyone. Despite this belief, Stallman continued to push on with his belief in hacker ethic.